CVE-2014-1584
Published Oct 15, 2014
Last updated 8 years ago
Overview
- Description
- The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
- Source
- security@mozilla.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97A0B769-5287-4E95-874B-F1D7FC41C7AF", "versionEndIncluding": "32.0" }, { "criteria": "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38EBC9E7-46AD-4DCD-AA7B-5071F55E3755" }, { "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ], "operator": "OR" } ] } ]